This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinea...
Project supported by the Key Area Research and Development Program of Guangdong Province,China(Grant No.2022B0701180001);the National Natural Science Foundation of China(Grant No.61801127);the Science Technology Planning Project of Guangdong Province,China(Grant Nos.2019B010140002 and 2020B111110002);the Guangdong–Hong Kong–Macao Joint Innovation Field Project(Grant No.2021A0505080006).
In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ...
supported by the National Natural Science Foundation of China(No.52077188);Guangdong Science and Technology Department(No.2019A1515011226);Hong Kong Research Grant Council(No.15219619).
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping...
supported by the Postgraduate Research&Practice Innovation Program of Jiangsu Province (Grant No.SJCX22_1677).
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare pro...
supported in part by National Key R&D Program of China (No. 2018YFA0702200);in part by National Natural Science Foundation of China (No. 61773099)。
A new privacy-preserving algorithm based on the Paillier cryptosystem including a new cooperative control strategy is proposed in this paper, which can resist the false data injection(FDI) attack based on the finite-t...
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RC/SERC/11/5).
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare appl...
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RG/SERC/11/4).
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp...
supported by the National Natural Science Foundation of China(No.62206238);the Natural Science Foundation of Jiangsu Province(Grant No.BK20220562);the Natural Science Research Project of Universities in Jiangsu Province(No.22KJB520010).
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra...
Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of ...
the deanship of Scientific research at King Khalid University for funding this work through the research group’s program under Grant Number R.G.P.2/5/44.
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit valu...